p0dalirius / FindUnusualSessionsLinks
A tool to remotely detect unusual sessions opened on windows machines using RPC
☆118Updated 4 months ago
Alternatives and similar repositories for FindUnusualSessions
Users that are interested in FindUnusualSessions are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- Addon for BHCE☆53Updated 6 months ago
- Persist like a Dodder☆65Updated 5 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆116Updated 9 months ago
- Group Policy Objects manipulation and exploitation framework☆263Updated last week
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 3 months ago
- BloodHound PowerShell client☆67Updated 3 weeks ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 10 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last week
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 5 months ago
- ☆114Updated 4 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆76Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated last week
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- Our Tips&Tricks☆126Updated 8 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆73Updated 6 months ago
- ☆164Updated 5 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆145Updated 2 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆60Updated 2 months ago
- Generate and Manage KeyCredentialLinks☆173Updated 2 weeks ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆80Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 6 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- ☆37Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆82Updated 5 months ago